pub struct CreateCertificateAuthorityRequest {
pub certificate_authority_configuration: CertificateAuthorityConfiguration,
pub certificate_authority_type: String,
pub idempotency_token: Option<String>,
pub key_storage_security_standard: Option<String>,
pub revocation_configuration: Option<RevocationConfiguration>,
pub tags: Option<Vec<Tag>>,
}
Fields§
Name and bit size of the private key algorithm, the name of the signing algorithm, and X.500 certificate subject information.
The type of the certificate authority.
idempotency_token: Option<String>
Custom string that can be used to distinguish between calls to the CreateCertificateAuthority action. Idempotency tokens for CreateCertificateAuthority time out after five minutes. Therefore, if you call CreateCertificateAuthority multiple times with the same idempotency token within five minutes, ACM Private CA recognizes that you are requesting only certificate authority and will issue only one. If you change the idempotency token for each call, PCA recognizes that you are requesting multiple certificate authorities.
key_storage_security_standard: Option<String>
Specifies a cryptographic key management compliance standard used for handling CA keys.
Default: FIPS_140_2_LEVEL_3_OR_HIGHER
Note: FIPS_140_2_LEVEL_3_OR_HIGHER
is not supported in Region ap-northeast-3. When creating a CA in the ap-northeast-3, you must provide FIPS_140_2_LEVEL_2_OR_HIGHER
as the argument for KeyStorageSecurityStandard
. Failure to do this results in an InvalidArgsException
with the message, "A certificate authority cannot be created in this region with the specified security standard."
revocation_configuration: Option<RevocationConfiguration>
Contains a Boolean value that you can use to enable a certification revocation list (CRL) for the CA, the name of the S3 bucket to which ACM Private CA will write the CRL, and an optional CNAME alias that you can use to hide the name of your bucket in the CRL Distribution Points extension of your CA certificate. For more information, see the CrlConfiguration structure.
Key-value pairs that will be attached to the new private CA. You can associate up to 50 tags with a private CA. For information using tags with IAM to manage permissions, see Controlling Access Using IAM Tags.
Trait Implementations§
Source§impl Clone for CreateCertificateAuthorityRequest
impl Clone for CreateCertificateAuthorityRequest
Source§fn clone(&self) -> CreateCertificateAuthorityRequest
fn clone(&self) -> CreateCertificateAuthorityRequest
1.0.0 · Source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
source
. Read moreSource§impl Default for CreateCertificateAuthorityRequest
impl Default for CreateCertificateAuthorityRequest
Source§fn default() -> CreateCertificateAuthorityRequest
fn default() -> CreateCertificateAuthorityRequest
Source§impl PartialEq for CreateCertificateAuthorityRequest
impl PartialEq for CreateCertificateAuthorityRequest
Source§fn eq(&self, other: &CreateCertificateAuthorityRequest) -> bool
fn eq(&self, other: &CreateCertificateAuthorityRequest) -> bool
self
and other
values to be equal, and is used by ==
.